Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe
-
Size
273KB
-
MD5
adaddf09ee671f505f65535dc259abc7
-
SHA1
6048d43765e38307845319eae9e3ae96683b634e
-
SHA256
b71537c70c11651aa8362581a71f7637f5a9e30df43fccb32173b500c5db099d
-
SHA512
e21580c787ac2d6b172d28a43b039749bcb39ad4802226c578e9fe6f205433bf7d15e6d934e0dda56671c3995d0d9e83cf6e7e8558dd3c99498a0d01838a0e89
-
SSDEEP
6144:E0VtQB0VL+Wmt6Te9GQmMHOzhHEsGQe5AQAr4wSg5+8Cv5P8wRX:5/1L+W3eEQKhksGN5qrdSgiH
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2104 igfxdpc32.exe -
Executes dropped EXE 47 IoCs
pid Process 2104 igfxdpc32.exe 2744 igfxdpc32.exe 2808 igfxdpc32.exe 2552 igfxdpc32.exe 2372 igfxdpc32.exe 1964 igfxdpc32.exe 2036 igfxdpc32.exe 1144 igfxdpc32.exe 2652 igfxdpc32.exe 2128 igfxdpc32.exe 404 igfxdpc32.exe 1788 igfxdpc32.exe 2160 igfxdpc32.exe 1548 igfxdpc32.exe 2292 igfxdpc32.exe 3064 igfxdpc32.exe 2432 igfxdpc32.exe 1800 igfxdpc32.exe 880 igfxdpc32.exe 2452 igfxdpc32.exe 2804 igfxdpc32.exe 2812 igfxdpc32.exe 2748 igfxdpc32.exe 2552 igfxdpc32.exe 1928 igfxdpc32.exe 2308 igfxdpc32.exe 1704 igfxdpc32.exe 2540 igfxdpc32.exe 2800 igfxdpc32.exe 2156 igfxdpc32.exe 2420 igfxdpc32.exe 2128 igfxdpc32.exe 1872 igfxdpc32.exe 1084 igfxdpc32.exe 1340 igfxdpc32.exe 856 igfxdpc32.exe 1504 igfxdpc32.exe 1028 igfxdpc32.exe 1528 igfxdpc32.exe 3056 igfxdpc32.exe 2060 igfxdpc32.exe 2656 igfxdpc32.exe 2696 igfxdpc32.exe 2820 igfxdpc32.exe 2532 igfxdpc32.exe 2584 igfxdpc32.exe 2096 igfxdpc32.exe -
Loads dropped DLL 64 IoCs
pid Process 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2552 igfxdpc32.exe 2552 igfxdpc32.exe 2372 igfxdpc32.exe 2372 igfxdpc32.exe 1964 igfxdpc32.exe 1964 igfxdpc32.exe 2036 igfxdpc32.exe 2036 igfxdpc32.exe 1144 igfxdpc32.exe 1144 igfxdpc32.exe 2652 igfxdpc32.exe 2652 igfxdpc32.exe 2128 igfxdpc32.exe 2128 igfxdpc32.exe 404 igfxdpc32.exe 404 igfxdpc32.exe 1788 igfxdpc32.exe 1788 igfxdpc32.exe 2160 igfxdpc32.exe 2160 igfxdpc32.exe 1548 igfxdpc32.exe 1548 igfxdpc32.exe 2292 igfxdpc32.exe 2292 igfxdpc32.exe 3064 igfxdpc32.exe 3064 igfxdpc32.exe 2432 igfxdpc32.exe 2432 igfxdpc32.exe 1800 igfxdpc32.exe 1800 igfxdpc32.exe 880 igfxdpc32.exe 880 igfxdpc32.exe 2452 igfxdpc32.exe 2452 igfxdpc32.exe 2804 igfxdpc32.exe 2804 igfxdpc32.exe 2812 igfxdpc32.exe 2812 igfxdpc32.exe 2748 igfxdpc32.exe 2748 igfxdpc32.exe 2552 igfxdpc32.exe 2552 igfxdpc32.exe 1928 igfxdpc32.exe 1928 igfxdpc32.exe 2308 igfxdpc32.exe 2308 igfxdpc32.exe 1704 igfxdpc32.exe 1704 igfxdpc32.exe 2540 igfxdpc32.exe 2540 igfxdpc32.exe 2800 igfxdpc32.exe 2800 igfxdpc32.exe 2156 igfxdpc32.exe 2156 igfxdpc32.exe 2420 igfxdpc32.exe 2420 igfxdpc32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxdpc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File created C:\Windows\SysWOW64\igfxdpc32.exe igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe File opened for modification C:\Windows\SysWOW64\ igfxdpc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdpc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2104 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2744 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe 2808 igfxdpc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2104 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2104 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2104 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 30 PID 2988 wrote to memory of 2104 2988 adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe 30 PID 2104 wrote to memory of 2744 2104 igfxdpc32.exe 32 PID 2104 wrote to memory of 2744 2104 igfxdpc32.exe 32 PID 2104 wrote to memory of 2744 2104 igfxdpc32.exe 32 PID 2104 wrote to memory of 2744 2104 igfxdpc32.exe 32 PID 2744 wrote to memory of 2808 2744 igfxdpc32.exe 33 PID 2744 wrote to memory of 2808 2744 igfxdpc32.exe 33 PID 2744 wrote to memory of 2808 2744 igfxdpc32.exe 33 PID 2744 wrote to memory of 2808 2744 igfxdpc32.exe 33 PID 2808 wrote to memory of 2552 2808 igfxdpc32.exe 34 PID 2808 wrote to memory of 2552 2808 igfxdpc32.exe 34 PID 2808 wrote to memory of 2552 2808 igfxdpc32.exe 34 PID 2808 wrote to memory of 2552 2808 igfxdpc32.exe 34 PID 2552 wrote to memory of 2372 2552 igfxdpc32.exe 35 PID 2552 wrote to memory of 2372 2552 igfxdpc32.exe 35 PID 2552 wrote to memory of 2372 2552 igfxdpc32.exe 35 PID 2552 wrote to memory of 2372 2552 igfxdpc32.exe 35 PID 2372 wrote to memory of 1964 2372 igfxdpc32.exe 36 PID 2372 wrote to memory of 1964 2372 igfxdpc32.exe 36 PID 2372 wrote to memory of 1964 2372 igfxdpc32.exe 36 PID 2372 wrote to memory of 1964 2372 igfxdpc32.exe 36 PID 1964 wrote to memory of 2036 1964 igfxdpc32.exe 37 PID 1964 wrote to memory of 2036 1964 igfxdpc32.exe 37 PID 1964 wrote to memory of 2036 1964 igfxdpc32.exe 37 PID 1964 wrote to memory of 2036 1964 igfxdpc32.exe 37 PID 2036 wrote to memory of 1144 2036 igfxdpc32.exe 38 PID 2036 wrote to memory of 1144 2036 igfxdpc32.exe 38 PID 2036 wrote to memory of 1144 2036 igfxdpc32.exe 38 PID 2036 wrote to memory of 1144 2036 igfxdpc32.exe 38 PID 1144 wrote to memory of 2652 1144 igfxdpc32.exe 39 PID 1144 wrote to memory of 2652 1144 igfxdpc32.exe 39 PID 1144 wrote to memory of 2652 1144 igfxdpc32.exe 39 PID 1144 wrote to memory of 2652 1144 igfxdpc32.exe 39 PID 2652 wrote to memory of 2128 2652 igfxdpc32.exe 40 PID 2652 wrote to memory of 2128 2652 igfxdpc32.exe 40 PID 2652 wrote to memory of 2128 2652 igfxdpc32.exe 40 PID 2652 wrote to memory of 2128 2652 igfxdpc32.exe 40 PID 2128 wrote to memory of 404 2128 igfxdpc32.exe 41 PID 2128 wrote to memory of 404 2128 igfxdpc32.exe 41 PID 2128 wrote to memory of 404 2128 igfxdpc32.exe 41 PID 2128 wrote to memory of 404 2128 igfxdpc32.exe 41 PID 404 wrote to memory of 1788 404 igfxdpc32.exe 42 PID 404 wrote to memory of 1788 404 igfxdpc32.exe 42 PID 404 wrote to memory of 1788 404 igfxdpc32.exe 42 PID 404 wrote to memory of 1788 404 igfxdpc32.exe 42 PID 1788 wrote to memory of 2160 1788 igfxdpc32.exe 43 PID 1788 wrote to memory of 2160 1788 igfxdpc32.exe 43 PID 1788 wrote to memory of 2160 1788 igfxdpc32.exe 43 PID 1788 wrote to memory of 2160 1788 igfxdpc32.exe 43 PID 2160 wrote to memory of 1548 2160 igfxdpc32.exe 44 PID 2160 wrote to memory of 1548 2160 igfxdpc32.exe 44 PID 2160 wrote to memory of 1548 2160 igfxdpc32.exe 44 PID 2160 wrote to memory of 1548 2160 igfxdpc32.exe 44 PID 1548 wrote to memory of 2292 1548 igfxdpc32.exe 45 PID 1548 wrote to memory of 2292 1548 igfxdpc32.exe 45 PID 1548 wrote to memory of 2292 1548 igfxdpc32.exe 45 PID 1548 wrote to memory of 2292 1548 igfxdpc32.exe 45 PID 2292 wrote to memory of 3064 2292 igfxdpc32.exe 46 PID 2292 wrote to memory of 3064 2292 igfxdpc32.exe 46 PID 2292 wrote to memory of 3064 2292 igfxdpc32.exe 46 PID 2292 wrote to memory of 3064 2292 igfxdpc32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adaddf09ee671f505f65535dc259abc7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Users\Admin\AppData\Local\Temp\ADADDF~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\igfxdpc32.exe"C:\Windows\system32\igfxdpc32.exe" C:\Windows\SysWOW64\IGFXDP~1.EXE48⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:2096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD5adaddf09ee671f505f65535dc259abc7
SHA16048d43765e38307845319eae9e3ae96683b634e
SHA256b71537c70c11651aa8362581a71f7637f5a9e30df43fccb32173b500c5db099d
SHA512e21580c787ac2d6b172d28a43b039749bcb39ad4802226c578e9fe6f205433bf7d15e6d934e0dda56671c3995d0d9e83cf6e7e8558dd3c99498a0d01838a0e89